Sponsored Content
Full Discussion: Our system was hacked
Special Forums Cybersecurity Our system was hacked Post 303037153 by Neo on Wednesday 24th of July 2019 10:51:59 PM
Old 07-24-2019
Turn on logging including router logging and closely monitor the logs.

Create a honeypot to lure the hackers into your logging traps, if you are interested to discover who is responsible.

Good job on keeping your backups up to date!
This User Gave Thanks to Neo For This Post:
 

3 More Discussions You Might Find Interesting

1. Linux

pc hacked

Hi, i think someone has hacked my server, the following rules used to come which i haven't put. Please help me i couldnt find out how this rules are apply, i think someone has put an script which generates enables the rules. But after restarting the iptables everything seems to be working... (0 Replies)
Discussion started by: naik_mit
0 Replies

2. Cybersecurity

How to know when you've been hacked

One of the most important ways to keep tou machine secure is to know when it has been broken into. The less time hackers have on your system, the less they can do to it, and the greater you chancens of kicking them off and repairing the damage. The more sophisticated the hacker, the less likely... (8 Replies)
Discussion started by: binhnx2000
8 Replies

3. Cybersecurity

Server hacked on known port

Hi, There is a recent case whereby it was reported that one of the production servers was hacked on port 1521. However, I am not sure how this was possible, as I checked that the OS firewall (iptables) is on : # /etc/init.d/iptables status Table: nat Chain PREROUTING (policy ACCEPT) num ... (7 Replies)
Discussion started by: anaigini45
7 Replies
cachefslog(1M)															    cachefslog(1M)

NAME
cachefslog - Cache File System logging SYNOPSIS
logfile| cachefs_mount_point DESCRIPTION
The command is used to enable or disable logging for a cachefs_mount_point. When the command is used without any options, it displays the logfile. The logfile contains information on the operation performed on a cachefs_mount_point and statistics used by to get the working set size of cache directory. The specified logfile will contain information for all the CacheFS mount points using the same cache direc- tory. A logfile and a cache directory have a 1-to-1 mapping; that is, even if a cache directory is removed and recreated with the same name, the logfile used in the previous instance of the cache directory cannot be reused with the new cache directory. Enabling logging may have performance impact, even if minimal, on the operations for all the CacheFS mount points using the same cache directory. The command is mainly used for debugging purposes. Options The following options are supported. You must be a superuser to use the and options. Specify the logfile to be used. Halt logging. Operands cachefs_mount_point A mount point of a cache file system. RETURN VALUE
returns the following values: Success. non-zero An error occurred. EXAMPLES
1. Checking the logging of a directory. This example checks if the CacheFS file system is being logged: 2. Changing the logfile. This example changes the logfile of to 3. Verifying the change of a logfile. This example verifies the change of the previous example: 4. Halting the logging of a directory. This example halts logging for the directory: AUTHOR
was developed by Sun Microsystems, Inc. SEE ALSO
cachefsstat(1M), cachefswssize(1M), cfsadmin(1M). cachefslog(1M)
All times are GMT -4. The time now is 10:43 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy